We are pleased to announce that in December 2017 the Encrypted Traffic Analytics (ETA) CVD Guide got published and is now available on Design Zone. This CVD covers Crypto Audit and Malware Detection in Encrypted Traffic.
Why Encrypted Traffic Analytics (ETA)? The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using encryption as the primary method of securing information.
What are the benefits of using ETA?
Faster time to response
Time and cost savings
Encrypted Traffic Analytics (Non-Fabric)
Enabling ETA and Flexible NetFlow in Campus Networks
Enabling ETA and Flexible NetFlow on Routers at the Edge and in WAN Branch Networks
Configuring Cognitive Threat Analytics with Stealthwatch
Configuring the Catalyst 9300 or Catalyst 9400
Configuring the ISR4000 and ASR1000 Family of Routers
Performing a Crypto Audit and Investigating Malware